First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the heap-based buffer overflow in upx is CVE-2021-43314.
CVE-2021-43314 has a severity rating of 7.5 (high).
All versions up to and excluding 4.0.0 of the Upx Project Upx software are affected by CVE-2021-43314.
To fix the vulnerability, update your Upx Project Upx software to version 4.0.0 or higher.
You can find more information about CVE-2021-43314 at the following link: https://github.com/upx/upx/issues/380